The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Jekyll: file reading via _config.yml Include Key
A local attacker can read a file via _config.yml Include Key of Jekyll, in order to obtain sensitive information...
Joomla JSN Framework System: file upload
An attacker can upload a malicious file on Joomla JSN Framework System, in order for example to upload a Trojan...
BlackBerry UEM: information disclosure via Management Console
An attacker can bypass access restrictions to data via Management Console of BlackBerry UEM, in order to obtain sensitive information...
SIMATIC: denial of service via Malicious Packets
An attacker can generate a fatal error via Malicious Packets of SIMATIC, in order to trigger a denial of service...
ROX II: privilege escalation
An attacker can bypass restrictions of ROX II, in order to escalate his privileges...
SIMATIC S7-1200: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of SIMATIC S7-1200, in order to force the victim to perform operations...
VMware ESXi/Workstation: infinite loop via 3D-rendering Shader
An attacker, inside a guest system, can generate an infinite loop via 3D-rendering Shader of VMware ESXi/Workstation, in order to trigger a denial of service on the host system...
Windows: vulnerabilities of October 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Windows PowerShell: information disclosure
An attacker can bypass access restrictions to data of Microsoft Windows PowerShell, in order to obtain sensitive information...
Microsoft Exchange Server: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Exchange Server...
Microsoft Office: vulnerabilities of October 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of October 2018
An attacker can use several vulnerabilities of Microsoft products...
Joomla Core: five vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
SAP: multiples vulnerabilities of October 2018
An attacker can use several vulnerabilities of SAP products...
Telerik Extensions for ASP.NET MVC: file reading
A local attacker can read a file of Telerik Extensions for ASP.NET MVC, in order to obtain sensitive information...
tinc: three vulnerabilities
An attacker can use several vulnerabilities of tinc...
Apple iOS: two vulnerabilities via Screen Lock Bypass
An attacker can use several vulnerabilities via Screen Lock Bypass of Apple iOS...
Net-SNMP: denial of service via GetNext PDU Multiple Varbinds
An attacker can generate a fatal error via GetNext PDU Multiple Varbinds of Net-SNMP, in order to trigger a denial of service...
Net-SNMP: denial of service via Incompletely Parsed Varbinds
An attacker can generate a fatal error via Incompletely Parsed Varbinds of Net-SNMP, in order to trigger a denial of service...
Synology DSM Calendar: file upload
An attacker can upload a malicious file on Synology DSM Calendar, in order for example to upload a Trojan...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: privilege escalation via HTTP Request Command Injection
An attacker can bypass restrictions via HTTP Request Command Injection of Cisco Data Center Network Manager, in order to escalate his privileges...
qpdf: denial of service via Nested Arrays Dictionaries
An attacker can generate a fatal error via Nested Arrays Dictionaries of qpdf, in order to trigger a denial of service...
QEMU: integer overflow via qemu_deliver_packet_iov
An attacker can generate an integer overflow via qemu_deliver_packet_iov() of QEMU, in order to trigger a denial of service, and possibly to run code...
QEMU: buffer overflow via pcnet_receive
An attacker can generate a buffer overflow via pcnet_receive() of QEMU, in order to trigger a denial of service, and possibly to run code...
QEMU: integer overflow via rtl8139_do_receive
An attacker can generate an integer overflow via rtl8139_do_receive() of QEMU, in order to trigger a denial of service, and possibly to run code...
QEMU: integer overflow via ne2000_receive
An attacker can generate an integer overflow via ne2000_receive() of QEMU, in order to trigger a denial of service, and possibly to run code...
OpenSC: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenSC...
Rust: buffer overflow via str-repeat
An attacker can generate a buffer overflow via str::repeat() of Rust, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 862 863 864 865 866 867 868 869 870 872 874 875 876 877 878 879 880 881 882 901 921 941 961 981 1001 1012